Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
55495119cd05497d40214c08290b3420N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
55495119cd05497d40214c08290b3420N.exe
Resource
win10v2004-20240709-en
General
-
Target
55495119cd05497d40214c08290b3420N.exe
-
Size
41KB
-
MD5
55495119cd05497d40214c08290b3420
-
SHA1
a6f13ccbda94d85a765da6bf98c28b1a9a6eb7e2
-
SHA256
79e0a66e96102c4fc36fffe0617f42050ebaf1ff736a8644338c61695bd95fb6
-
SHA512
0696a13010393deffd16d25579b5967a3d4a50d64913688314d58bc55dcf86bf8d795598cdb51ec70ee32eeba51c34f5200becc24481ed5b92299307d099b5a4
-
SSDEEP
384:GeprknnLn+Xn+Lnsyjsr+K+B7w1J1C/1HkppfdJdI4Rb2J23GwtCKi5F7:nZIL+X+LsDo7u0SdJ2J2WwtCKi51
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55} 55495119cd05497d40214c08290b3420N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55}\stubpath = "%SystemRoot%\\system32\\vmtoolsd.exe" 55495119cd05497d40214c08290b3420N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vmtoolsd.exe 55495119cd05497d40214c08290b3420N.exe File opened for modification C:\Windows\SysWOW64\vmtoolsd.exe 55495119cd05497d40214c08290b3420N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55495119cd05497d40214c08290b3420N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3564 55495119cd05497d40214c08290b3420N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3792 3564 55495119cd05497d40214c08290b3420N.exe 89 PID 3564 wrote to memory of 3792 3564 55495119cd05497d40214c08290b3420N.exe 89 PID 3564 wrote to memory of 3792 3564 55495119cd05497d40214c08290b3420N.exe 89 PID 3564 wrote to memory of 1760 3564 55495119cd05497d40214c08290b3420N.exe 93 PID 3564 wrote to memory of 1760 3564 55495119cd05497d40214c08290b3420N.exe 93 PID 3564 wrote to memory of 1760 3564 55495119cd05497d40214c08290b3420N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\55495119cd05497d40214c08290b3420N.exe"C:\Users\Admin\AppData\Local\Temp\55495119cd05497d40214c08290b3420N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55}" /f2⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\554951~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1760
-